Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: texas booster
The KISS answer is that Chinese security have the best hackers, and were able to find these “breadcrumbs” through Hillary and ALL other “private” servers running around DC.

How is that KISS? Are you saying they hacked into Hillary's server, read emails with names of agents, and rounded them up? That's not KISS and there's no evidence for names like that being in any of the emails.

Here's KISS: some crappy CIA software connected clients back to a "secret" proxy somewhere. The Chinese figured out that the proxy belonged to the CIA, which can be leaked (KISS) or figured out (not quite as simple but doable). Then anybody connecting to that proxy would be rounded up. Sometimes that would require arresting everyone at the internet cafe and going through all of the computers, but that's easy for Chinese Communists..

25 posted on 08/19/2018 8:52:43 AM PDT by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 24 | View Replies ]


To: palmer
Hillary's server did not take much skill to read her emails.

IIRC Holder, Comey, Rice, Brennan(?) and a bunch of other top officials had private servers or used public email for government business, to get around federal documentation regulations of email traffic. That were put in place by the Dems themselves.

This article goes all the way around the bend to try to keep from mentioning the multiple security violations that were ignored under the Obama regime.

So they blame the Chicoms, or the faceless coders. Anything to keep from implicating the men in the high towers.

26 posted on 08/19/2018 10:25:07 AM PDT by texas booster (Join FreeRepublic's Folding@Home team (Team # 36120) Cure Alzheimer's!)
[ Post Reply | Private Reply | To 25 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson